
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability was discovered in NTFS-3G versions prior to 2021.8.22. The vulnerability (CVE-2021-39263) is caused by an unsanitized attribute in the ntfsgetattribute_value function. This security flaw affects the NTFS-3G FUSE driver, which provides read-write NTFS support for various operating systems (NVD, Debian Security).
The vulnerability is classified with a CVSS v3 score of 7.8 (High), indicating significant severity. The attack vector is local, requiring low attack complexity and low privileges, with no user interaction needed. The scope is unchanged, but the potential impact on confidentiality, integrity, and availability is high (Ubuntu Security).
The vulnerability could allow an attacker using a maliciously crafted NTFS-formatted image file to potentially execute arbitrary privileged code. This is particularly concerning if the ntfs-3g binary is setuid root or if an attacker has physical access to an external port on a computer configured to run ntfs-3g or ntfsprogs tools (GitHub Advisory).
The vulnerability was patched in NTFS-3G version 2021.8.22. Users and system administrators are strongly advised to upgrade to this version or later. The fix addresses the unsanitized attribute issue in the ntfsgetattribute_value function (GitHub Releases, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."